Vpn Solutions

Good Essays
Week 2 Discussion 1:
"VPN Solutions" Please respond to the following:
•Imagine you are a consultant called upon by a large U.S. corporation having more than 10,000 employees nationwide. You are asked to implement a VPN solution for remotely located employees to access the same corporate resources as they could from their desktops at work. Describe, in order, the types of questions you would ask their management and IT personnel in an information-gathering session before providing them a plan of work.

When implementing a VPN within an enterprise environment, security professions should begin with asking the following questions: * What is the purpose of implementing a VPN? * Is our goal to save money? To facilitate remote access? Or is it to link end users and/or branch offices together in order to increase efficiency and productivity? * What existing technologies and resources do we have available to expedite this process? * Will the virtual network encompass users outside of our company? * What traffic patterns and load can we expect on the virtual network? * Will users be allocated specific times to access resources? How will we ensure enough capacity to fulfill needs? * What types of application, hardware, and software will be used to access and manage connections for the VPN? * Will our existing IT department be able to handle the reconfiguration of embedded devices such as firewalls, virus scanners, and the like? * Who will manage and maintain the VPN? * Are the above all worthwhile causes to implement a VPN over a dedicated line?

Van der Horst, Jasper. " VPN Implementation: Questions to Ask and Points to Consider - Safe Passage | Roundup | PCMag.com." Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. N.p., 25 Sept. 2001. Web. 20 Apr. 2013. <http://www.pcmag.com/article2/0,2817,5442,00.asp>.

•Explain what is meant by “split

You May Also Find These Documents Helpful

  • Better Essays

    Vpn

    • 1208 Words
    • 5 Pages

    VPN Introduction: VPN stands for Virtual Private Network. VPN is a data network connection that makes use of the public telecommunication infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. It operates much like a Wide Area Network (WAN). Most companies actually leased lines, but in either case both solutions are very expensive. As the Internet became more widely available people started creating VPN solutions that took advantage of the…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Vpn with Ipsec

    • 4525 Words
    • 19 Pages

    1. Abstract The goal of VPNs is to provide a cost-effective and secure way to connect business to one another and remote workers to office networks. Network Security Protocols encompasses the basis for safe & reliable data transfer. These security devices should be able to provide accountability, access control, confidentiality, integrity, while all the time being cost effective. This provides us with different security protocols related to the transfer of data through a network. With a prevalent…

    • 4525 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    IPsec and VPN

    • 1390 Words
    • 6 Pages

    IPSec Internet Protocol Security (IPsec) is a set of protocol for establishment of securing Internet Protocol (IP) communications. Safety on data was established through process of authentication and encryption of each IP packet in every communication session. At the beginning of the session, mutual authentication between agents will established and cryptographic keys to be used will arbitrated during the session. IPsec can be applied in protecting data flows not only between pair of hosts and…

    • 1390 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Vpn and Radius

    • 470 Words
    • 2 Pages

    VPN and RADIUS The boom in telecommuting and the need to support more remote workers is making life tough for IT managers. Besides the normal tasks of maintaining remote-access server (RAS) equipment, managers often find their time consumed administering access rights and authentication privileges on several, geographically dispersed remote access servers at the same time. Enter the Remote Authentication Dial In User Service (RADIUS), a commonly used authentication system. Most remote-access…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cisco - Vpn Configuration

    • 9191 Words
    • 37 Pages

    C H A P T E R 7 Site-to-Site VPN Configuration Examples A site-to-site VPN protects the network resources on your protected networks from unauthorized use by users on an unprotected network, such as the public Internet. The basic configuration for this type of implementation has been covered in Chapter 6, “Configuring IPSec and Certification Authorities.” This chapter provides examples of the following site-to-site VPN configurations: • • • • • Using Pre-Shared Keys Using PIX Firewall…

    • 9191 Words
    • 37 Pages
    Good Essays
  • Satisfactory Essays

    Vpn Reactor Guide

    • 316 Words
    • 2 Pages

    [pic] What service does VPN Reactor provides? - provides a secure way of connecting through a public network (such as the Internet) to a remote network/location. This remote network is typically a private network, such as a workplace or home network, or one provided by a commercial VPN service. No complicated software to install and works on all platforms. VPN’s features • Free easy-to-use App for Windows and Mac • Works on all platforms, Windows, Mac OSX, iPhone, etc.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Setting Up a Vpn

    • 411 Words
    • 2 Pages

    1. Create a virtual private network (VPN) for authenticated users. VPNs are encrypting connections that lie between two parts. Using a VPN connection would provide a high level of security for employees given that the VPN is setup correctly. With using a VPN comes the convenience of connection to the company’s network from multiple locations without being at the office. 2. Separate authenticated and anonymous users on separate servers). Users have been reporting many issues with the network…

    • 411 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Ssl Vpn Security

    • 2614 Words
    • 11 Pages

    Introduction In recent years, various virtual private network (VPN) technologies have been widely used to provide secure site-to-site connectivity and remote access. There are many reasons for such overwhelming adoption and business success; two major factors are total ownership cost savings and productivity enhancements. The total ownership cost can be considered as the initial deployment cost plus the cost of user training, support, and facility maintenance over time. Productivity enhancements…

    • 2614 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    There are always many factors that will impact the VPN server performance and stability. There is never a one size fits all solutions to any problem. There are many pros and cons that need to be considered. Two performance factors are the load balancing and software configuration. (Jain, S., 2006) While two stability factors are computer programs/equipment and location. (randomwire.com, 2010) In load balancing, the performance is as important as redundancy. NLB can be used to run multiple running…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IP Tunneling and VPNs Overview The purpose of this module is to explain Virtual Private Network (VPN) concepts and to overview various L2 and L3 tunneling techniques that allow for implementation of VPNs. The access VPN features in Cisco IOS Release 12.1 are explained along with Layer 2 and Layer 3 tunneling mechanisms. Objectives Upon completion of this module, you will be able to perform the following tasks: n Explain Virtual Private Network concepts and possibilities n Describe Layer-2 tunneling…

    • 12448 Words
    • 96 Pages
    Powerful Essays